Weitere Beispiele werden automatisch zu den Stichwörtern zugeordnet - wir garantieren ihre Korrektheit nicht.
Built-in PPPoE protocol for individual authenticated access to remote servers.
You may access LearningNI only through authenticated access - anonymous access is currently not supported.
It manages memberships for twenty organizations, and this work includes secure hosting, digital work flow management, authenticated access to electronic resources, and online conference registration.
This resource is delivered under authenticated access only to staff and students in sub-licensed universities and colleges in the UK (see http://www.filmandsound.ac.uk).
It is implemented as a contactless smart card using the Calypso standard, and enables authenticated access at turnstiles by passing the card near an electronic reader.
See http://bufvc.ac.uk/tvandradio/trilt (under authenticated access only).
By limiting external access to all storage systems through a standard SRM interface, one can assure not only authenticated access, but also the enforcement of authorized access to files.
The different security objectives include authentication of data transfer through digital signatures, ensuring only authenticated access, prevention of eavesdropping, prevention of playback and spoofing, and intrusion detection.
Anonymous access can be used for SharePoint and authenticated access to the hosted applications in the framework or a third-party LDAP solution can be used.
The app allows 15,000 members of the Academy of Television Arts & Sciences who vote on the Emmy awards to gain authenticated access to view NBC's programs.
In general, edge devices are normally routers that provide authenticated access (most commonly PPPoA and PPPoE) to faster, more efficient backbone and core networks.
The security companies say they want an easier way for users to switch off Microsoft's security console, and a way to provide security software companies authenticated access to the Vista kernel while keeping software vandals out.
Some BUFVC services are delivered online worldwide without charge, whereas other services are only offered under authenticated access to users in the UK or to staff in BUFVC member institutions.
While often lumped together as similar solutions, SSL-Explorer is conceptually different from OpenVPN in that it provides controlled and authenticated access to services and applications within a network rather than full, unchallenged network access [4].
Some SMTP servers support authenticated access on an additional port other than 587 or 25 to allow users to connect to them even if port 25 is blocked, but 587 is the standardized and widely-supported port for users to submit new mail.